outlook en servidor de correo send mail

Todos los comentarios sobre redes y servidores en linux y su interacción con otros sistemas operativos.

Moderadores: doc, Kde_Tony, ps-ax

Responder
Avatar de Usuario
ixtry
Forista Nuevo
Forista Nuevo
Mensajes: 18
Registrado: Vie May 23, 2008 7:00 am

outlook en servidor de correo send mail

Mensaje por ixtry »

hola

soy nueva en esto de servidores en linux , tengo intalado un servidor de correo en send mail + centos 4 + squidmail.

problema

en la red local funciona excelente el correo tanto por outlook como por squimail pero en algunas ocasiones los usuarios necesitan revisar sus correos fuera de la red local sola mente lo pueden checar por squidmail y no por outlook o por tunderbil

este es el error que me aparece en outlook

La tarea 'Enviando ' ha notificado el error
> > (0x80042109) : 'Outlook no puede conectar con el servidor de correo
> > saliente (SMTP). Si sigue recibiendo este mensaje, póngase en contacto
> > con el administrador del servidor o con el proveedor de servicios de
> > Internet (ISP).'

este es el error que me aparece con thnderbill

fallo el envio de mensaje
no se pudo enviar el mensaje porque fallo la coneccion con el servidor
smtp mail.seguridad.com.mx el servidor puede estar no disponible o esta rechazando las conecciones smtp porfavor verifique la
configuracion smtp es correcta y vuelva a intentarlo o contacte al administrador de su red

buscando
cheque que el puerto 25 estubiera habierto con esta instruccion
netstat -ln | grep 25
y arrojo esto

tcp 0 0.0.0.0:25 0.0.0.0:* LISTEN

tambien cheque el firewall de linux dejara pasar el puerto 25 y 587 , el router
y con mi provedor de isp tengo habilitados los puertos. he llegado a la conclusion
de que mi problema esta en la configuracion del servidor de sendmail


comentarios extras
existe ip fija
no estoy bloqueada no se encuentra la ip en ninguna lista negra

les dejo mi archivo de configuracion sendmail

divert(-1)dnl
Otra dnl #
Otra dnl # This is the sendmail macro config file for m4. If you make changes to
Otra dnl # /etc/mail/sendmail.mc, you will need to regenerate the
Otra dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
Otra dnl # installed and then performing a
Otra dnl #
Otra dnl # make -C /etc/mail
Otra dnl #
Otra include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
Otra VERSIONID(`setup for Red Hat Linux')dnl
Tipo de SO OSTYPE(`linux')dnl
Otra dnl #
Otra dnl # default logging level is 9, you might want to set it higher to
Otra dnl # debug the configuration
Otra dnl #
Otra dnl define(`confLOG_LEVEL', `9')dnl
Otra dnl #
Otra dnl # Uncomment and edit the following line if your outgoing mail needs to
Otra dnl # be sent out through an external mail server:
Otra dnl #
Otra dnl define(`SMART_HOST',`smtp.your.provider')
Otra dnl #
Definir define(`confDEF_USER_ID',``8:12'')dnl
Otra dnl define(`confAUTO_REBUILD')dnl
Definir define(`confTO_CONNECT', `1m')dnl
Definir define(`confTRY_NULL_MX_LIST',true)dnl
Definir define(`confDONT_PROBE_INTERFACES',true)dnl
Definir define(`PROCMAIL_MAILER_PATH',`/usr/bin/procmail')dnl
Definir define(`ALIAS_FILE', `/etc/aliases')dnl
Definir define(`STATUS_FILE', `/var/log/mail/statistics')dnl
Definir define(`UUCP_MAILER_MAX', `2000000')dnl
Definir define(`confUSERDB_SPEC', `/etc/mail/userdb.db')dnl
Definir define(`confPRIVACY_FLAGS', `authwarnings,novrfy,noexpn,restrictqrun')dnl
Definir define(`confAUTH_OPTIONS', `A')dnl
Otra dnl #
Otra dnl # The following allows relaying if the user authenticates, and disallows
Otra dnl # plaintext authentication (PLAIN/LOGIN) on non-TLS links
Otra dnl #
Otra dnl define(`confAUTH_OPTIONS', `A p')dnl
Otra dnl #
Otra dnl # PLAIN is the preferred plaintext authentication method and used by
Otra dnl # Mozilla Mail and Evolution, though Outlook Express and other MUAs do
Otra dnl # use LOGIN. Other mechanisms should be used if the connection is not
Otra dnl # guaranteed secure.
Otra dnl # Please remember that saslauthd needs to be running for AUTH.
Otra dnl #
Otra TRUST_AUTH_MECH(`EXTERNAL DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
Definir define(`confAUTH_MECHANISMS', `EXTERNAL GSSAPI DIGEST-MD5 CRAM-MD5 LOGIN PLAIN')dnl
Otra dnl #
Otra dnl # Rudimentary information on creating certificates for sendmail TLS:
Otra dnl # cd /usr/share/ssl/certs; make sendmail.pem
Otra dnl # Complete usage:
Otra dnl # make -C /usr/share/ssl/certs usage
Otra dnl #
Otra dnl define(`confCACERT_PATH',`/usr/share/ssl/certs')
Otra dnl define(`confCACERT',`/usr/share/ssl/certs/ca-bundle.crt')
Otra dnl define(`confSERVER_CERT',`/usr/share/ssl/certs/sendmail.pem')
Otra dnl define(`confSERVER_KEY',`/usr/share/ssl/certs/sendmail.pem')
Otra dnl #
Otra dnl # This allows sendmail to use a keyfile that is shared with OpenLDAP's
Otra dnl # slapd, which requires the file to be readble by group ldap
Otra dnl #
Otra dnl define(`confDONT_BLAME_SENDMAIL',`groupreadablekeyfile')dnl
Otra dnl #
Otra dnl define(`confTO_QUEUEWARN', `4h')dnl
Otra dnl define(`confTO_QUEUERETURN', `5d')dnl
Otra dnl define(`confQUEUE_LA', `12')dnl
Otra dnl define(`confREFUSE_LA', `18')dnl
Definir define(`confTO_IDENT', `0')dnl
Otra dnl FEATURE(delay_checks)dnl
Característica FEATURE(`no_default_msa',`dnl')dnl
Característica FEATURE(`smrsh',`/usr/sbin/smrsh')dnl
Característica FEATURE(`mailertable',`hash -o /etc/mail/mailertable.db')dnl
Característica FEATURE(`virtusertable',`hash -o /etc/mail/virtusertable.db')dnl
Característica FEATURE(redirect)dnl
Característica FEATURE(always_add_domain)dnl
Característica FEATURE(use_cw_file)dnl
Característica FEATURE(use_ct_file)dnl
Otra dnl #
Otra dnl # The following limits the number of processes sendmail can fork to accept
Otra dnl # incoming messages or process its message queues to 12.) sendmail refuses
Otra dnl # to accept connections once it has reached its quota of child processes.
Otra dnl #
Otra dnl define(`confMAX_DAEMON_CHILDREN', 12)dnl
Otra dnl #
Otra dnl # Limits the number of new connections per second. This caps the overhead
Otra dnl # incurred due to forking new sendmail processes. May be useful against
Otra dnl # DoS attacks or barrages of spam. (As mentioned below, a per-IP address
Otra dnl # limit would be useful but is not available as an option at this writing.)
Otra dnl #
Otra dnl define(`confCONNECTION_RATE_THROTTLE', 3)dnl
Otra dnl #
Otra dnl # The -t option will retry delivery if e.g. the user runs over his quota.
Otra dnl #
Característica FEATURE(local_procmail,`',`procmail -t -Y -a $h -d $u')dnl
Característica FEATURE(`access_db',`hash -T<TMPF> -o /etc/mail/access.db')dnl
Característica FEATURE(`blacklist_recipients')dnl
Otra EXPOSED_USER(`root')dnl
Otra dnl #
Otra dnl # The following causes sendmail to only listen on the IPv4 loopback address
Otra dnl # 127.0.0.1 and not on any other network devices. Remove the loopback
Otra dnl # address restriction to accept email from the internet or intranet.
Otra dnl #
Otra DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
Otra dnl # O DaemonPortOptions = Port = 2525, Name = MTA
Otra dnl # 0 DaemonPortOptions = Port = 2525, Name = MTA
Otra dnl #
Otra dnl # The following causes sendmail to additionally listen to port 587 for
Otra dnl # mail from MUAs that authenticate. Roaming users who can't reach their
Otra dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
Otra dnl # this useful.
Otra dnl #
Otra dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
Otra dnl #
Otra dnl # The following causes sendmail to additionally listen to port 465, but
Otra dnl # starting immediately in TLS mode upon connecting. Port 25 or 587 followed
Otra dnl # by STARTTLS is preferred, but roaming clients using Outlook Express can't
Otra dnl # do STARTTLS on ports other than 25. Mozilla Mail can ONLY use STARTTLS
Otra dnl # and doesn't support the deprecated smtps; Evolution <1.1.1 uses smtps
Otra dnl # when SSL is enabled-- STARTTLS support is available in version 1.1.1.
Otra dnl #
Otra dnl # For this to work your OpenSSL certificates must be configured.
Otra dnl #
Otra dnl DAEMON_OPTIONS(`Port=smtps, Name=TLSMTA, M=s')dnl
Otra dnl #
Otra dnl # The following causes sendmail to additionally listen on the IPv6 loopback
Otra dnl # device. Remove the loopback address restriction listen to the network.
Otra dnl #
Otra dnl DAEMON_OPTIONS(`port=smtp,Addr=::1, Name=MTA-v6, Family=inet6')dnl
Otra dnl #
Otra dnl # enable both ipv6 and ipv4 in sendmail:
Otra dnl #
Otra dnl DAEMON_OPTIONS(`Name=MTA-v4, Family=inet, Name=MTA-v6, Family=inet6')
Otra dnl #
Otra dnl # We strongly recommend not accepting unresolvable domains if you want to
Otra dnl # protect yourself from spam. However, the laptop and users on computers
Otra dnl # that do not have 24x7 DNS do need this.
Otra dnl #
Otra dnl FEATURE(`accept_unresolvable_domains')dnl
Otra dnl #
Otra dnl FEATURE(`relay_based_on_MX')dnl
Otra dnl #
Otra dnl # Also accept email sent to "localhost.localdomain" as local email.
Otra dnl #
Otra LOCAL_DOMAIN(`localhost.localdomain')dnl
Otra dnl #
Otra dnl # The following example makes mail from this host and any additional
Otra dnl # specified domains appear to be sent from mydomain.com
Otra dnl #
Otra dnl MASQUERADE_AS(`mydomain.com')dnl
Otra dnl #
Otra dnl # masquerade not just the headers, but the envelope as well
Otra dnl #
Otra dnl FEATURE(masquerade_envelope)dnl
Otra dnl #
Otra dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
Otra dnl #
Otra dnl FEATURE(masquerade_entire_domain)dnl
Otra dnl #
Otra dnl MASQUERADE_DOMAIN(localhost)dnl
Otra dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
Otra dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
Otra dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
Característica FEATURE(dnsbl, `blackholes.mail-abuse.org', `Rechazado - vea http://www.mail-abuse.org/rbl/')dnl
Característica FEATURE(dnsbl, `dialups.mail-abuse.org', `Rechazado - vea http://www.mail-abuse.org/dul/')dnl
Característica FEATURE(dnsbl, `relays.mail-abuse.org', `Rechazado - vea http://work-rss.mail-abuse.org/rss/')dnl
Característica FEATURE(dnsbl, `sbl-xbl.spamhaus.org', `"550 Su IP esta en lista negra en Spamhaus - Por favor vea http://www.spamhaus.org/query/bl?ip=+"$&{client_addr}')dnl
Característica FEATURE(dnsbl, `bl.spamcop.net', `"550 Su IP esta en lista negra en SpamCOP - Por favor vea http://spamcop.net/bl.shtml?{client_addr}')dnl
Característica FEATURE(dnsbl, `list.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?{client_addr}')dnl
Característica FEATURE(dnsbl, `multihop.dsbl.org', `"550 Su IP esta en lista negra en DSBL - Por favor vea http://dsbl.org/listing?{client_addr}')dnl
Característica FEATURE(dnsbl, `dnsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl
Característica FEATURE(dnsbl, `rhsbl.ahbl.org',`"550 Su IP esta en lista negra en AHBL - Por favor vea http://www.ahbl.org/tools/lookup.php?ip="$&{client_addr}')dnl
Característica FEATURE(dnsbl, `bl.csma.biz', `"550 Su IP esta en lista negra en CSMA - Por favor vea http://bl.csma.biz/cgi-bin/listing.cgi? ... lient_addr}')dnl
Característica FEATURE(dnsbl, `dnsbl.antispam.or.id', `"550 Su IP esta en lista negra en ADNSBL - Por favor vea http://antispam.or.id/?ip="$&{client_addr}')dnl
Característica FEATURE(dnsbl, `blacklist.spambag.org', `"550 Su IP esta en lista negra en SPAMBAG - Por favor vea http://www.spambag.org/cgi-bin/spambag? ... lient_addr}')dnl
Cartero MAILER(smtp)dnl
Cartero MAILER(procmail)dnl

ojala me puedan orientar muchas gracias








* Titulo editado por el Administrador por decir muy poco del tema a tratar, por favor, revisa el reglamento del foro

Avatar de Usuario
Julito
Forista Medio
Forista Medio
Mensajes: 201
Registrado: Jue Abr 10, 2008 7:00 am

Mensaje por Julito »

Si bien dices que lo chequeaste que dejara pasar el firewall el puerto alternativo smtp, probaste cambia el 25 por el 587 en la configuracion de los dos programas?
------------------------------------------------
Hablar es barato. Enséñame el código.
Linux Torvarlds.

Avatar de Usuario
ixtry
Forista Nuevo
Forista Nuevo
Mensajes: 18
Registrado: Vie May 23, 2008 7:00 am

Re: outlook

Mensaje por ixtry »

muchas gracias por contestarme de hecho tengo habiertos en los dos puertos en ambos programas

Avatar de Usuario
Julito
Forista Medio
Forista Medio
Mensajes: 201
Registrado: Jue Abr 10, 2008 7:00 am

Mensaje por Julito »

Verifica que generalmente todos estos tipos de programas tienen la opcion de "mi servidor requiere autentificacion" o parecida que si no esta marcada suele dar conflictos.

Saludos.
------------------------------------------------
Hablar es barato. Enséñame el código.
Linux Torvarlds.

Avatar de Usuario
ixtry
Forista Nuevo
Forista Nuevo
Mensajes: 18
Registrado: Vie May 23, 2008 7:00 am

Re: outlook

Mensaje por ixtry »

gracias por echarme la mano ya cheque lo de la autentificacion
y no funciono ,alguna otra idea que se les ocurra

gracias

Avatar de Usuario
mrojas
Forista Nuevo
Forista Nuevo
Mensajes: 16
Registrado: Lun Oct 29, 2007 8:00 am

Re: outlook

Mensaje por mrojas »

Hola:

Al parecer tienes el mismo problema que Pasavino ( http://www.espaciolinux.com/foros-tema-t36685.html) que hasta el momento no ha podido solucionar su problema por lo que veo, Haz intentado entrar a los Puertos 25 o 110 desde fuera de la Red.

telnet correo.dominio.com 25
telnet correo.dominio.com 110
Para ambos casos debe de ingresar de lo contrario ese seria tu problema.

A mi paso lo mismo lo detecte con un software que escanea puertos y verifique que esos no estaban abiertos externamente pero si internamente...

Suerte, espero sigas informando.

Atte.
Manuel Rojas :twisted:

Avatar de Usuario
ixtry
Forista Nuevo
Forista Nuevo
Mensajes: 18
Registrado: Vie May 23, 2008 7:00 am

Re: outlook

Mensaje por ixtry »

si hago telnet al puerto dentro de la red interna sale lo siguiente
220 servidor.decorreo.seguridad.com ESMTP Sendmail 8.12.8/8.12.8; 23 jul 2008 16:30:12 +0500

pero si hago telnet al puerto 25 fuera de la red interna por ejemplo mi casa
me aparece una leyenda de host inaccesible

y con el puerto 110 no tengo problema dentro y fuera de la red

tambien para comentarles que chequeado en un libro cambie en mi archivo
send mail estas lineas

DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
dnl # O DaemonPortOptions = Port = 2525, Name = MTA
dnl # 0 DaemonPortOptions = Port = 2525, Name = MTA
dnl #
dnl # The following causes sendmail to additionally listen to port 587 for
dnl # mail from MUAs that authenticate. Roaming users who can't reach their
dnl # preferred sendmail daemon due to port 25 being blocked or redirected find
dnl # this useful.
dnl #
dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl
dnl #


por estas

DAEMON_OPTIONS(`Port=smtp, Name=MTA')dnl
dnl DAEMON_OPTIONS(`Port=submission, Name=MSA, M=Ea')dnl

y no funciono

alguna otra idea que seles ocurra?

gracias

Avatar de Usuario
mrojas
Forista Nuevo
Forista Nuevo
Mensajes: 16
Registrado: Lun Oct 29, 2007 8:00 am

Re: outlook

Mensaje por mrojas »

Usas IMAP (Cyrus, Courier u otro),? si tienes habilitado Webmail intenta enviar correos desde ahi pero parece que el problema resido en la politicas del FireWall


saludos
Atte.
Manuel Rojas :twisted:

Avatar de Usuario
ixtry
Forista Nuevo
Forista Nuevo
Mensajes: 18
Registrado: Vie May 23, 2008 7:00 am

Re: outlook

Mensaje por ixtry »

el sofftware que tengo es centos,sendmail squidmail
por medio del squidmail envio y recibo correos fuera de la red interna
por ejemplo en mi casa

pero cuando quiero enviar por medio del outlook no me deja en la parte de arriba viene el error que me marca en outlook como en tunderbill


les dejo mi archivo para lo del imap



## Dovecot 1.0 configuration file

# Default values are shown after each value, it's not required to uncomment
# any of the lines. Exception to this are paths, they're just examples
# with real defaults being based on configure options. The paths listed here
# are for configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
# --with-ssldir=/usr/share/ssl

# Base directory where to store runtime data.
#base_dir = /var/run/dovecot/

# Protocols we want to be serving:
# imap imaps pop3 pop3s
protocols = imap pop3 imaps

# IP or host address where to listen in for connections. It's not currently
# possible to specify multiple addresses. "*" listens in all IPv4 interfaces.
# "[::]" listens in all IPv6 interfaces, but may also listen in all IPv4
# interfaces depending on the operating system. You can specify ports with
# "host:port".
imap_listen = [::]
pop3_listen = [::]

# IP or host address where to listen in for SSL connections. Defaults
# to above non-SSL equilevants if not specified.
#imaps_listen =
#pop3s_listen =

# Disable SSL/TLS support.
#ssl_disable = no

# PEM encoded X.509 SSL/TLS certificate and private key. They're opened before
# dropping root privileges, so keep the key file unreadable by anyone but
# root. Included doc/mkcert.sh can be used to easily generate self-signed
# certificate, just make sure to update the domains in dovecot-openssl.cnf
#ssl_cert_file = /usr/share/ssl/certs/dovecot.pem
#ssl_key_file = /usr/share/ssl/private/dovecot.pem

# SSL parameter file. Master process generates this file for login processes.
# It contains Diffie Hellman and RSA parameters.
#ssl_parameters_file = /var/run/dovecot/ssl-parameters.dat

# How often to regenerate the SSL parameters file. Generation is quite CPU
# intensive operation. The value is in hours, 0 disables regeneration
# entirely.
#ssl_parameters_regenerate = 24

# Disable LOGIN command and all other plaintext authentications unless
# SSL/TLS is used (LOGINDISABLED capability). Note that 127.*.*.* and
# IPv6 ::1 addresses are considered secure, this setting has no effect if
# you connect from those addresses.
#disable_plaintext_auth = yes

# Use this logfile instead of syslog(). /dev/stderr can be used if you want to
# use stderr for logging (ONLY /dev/stderr - otherwise it is closed).
#log_path =

# For informational messages, use this logfile instead of the default
#info_log_path =

# Prefix for each line written to log file. % codes are in strftime(3)
# format.
#log_timestamp = "%b %d %H:%M:%S "

##
## Login processes
##

# Directory where authentication process places authentication UNIX sockets
# which login needs to be able to connect to. The sockets are created when
# running as root, so you don't have to worry about permissions. Note that
# everything in this directory is deleted when Dovecot is started.
login_dir = /var/run/dovecot-login

# chroot login process to the login_dir. Only reason not to do this is if you
# wish to run the whole Dovecot without roots.
#login_chroot = yes


##
## IMAP login process
##

login = imap

# Executable location.
#login_executable = /usr/libexec/dovecot/imap-login

# User to use for the login process. Create a completely new user for this,
# and don't use it anywhere else. The user must also belong to a group where
# only it has access, it's used to control access for authentication process.
#login_user = dovecot

# Set max. process size in megabytes. If you don't use
# login_process_per_connection you might need to grow this.
#login_process_size = 32

# Should each login be processed in it's own process (yes), or should one
# login process be allowed to process multiple connections (no)? Yes is more
# secure, espcially with SSL/TLS enabled. No is faster since there's no need
# to create processes all the time.
#login_process_per_connection = yes

# Number of login processes to create. If login_process_per_user is
# yes, this is the number of extra processes waiting for users to log in.
#login_processes_count = 3

# Maximum number of extra login processes to create. The extra process count
# usually stays at login_processes_count, but when multiple users start logging
# in at the same time more extra processes are created. To prevent fork-bombing
# we check only once in a second if new processes should be created - if all
# of them are used at the time, we double their amount until limit set by this
# setting is reached. This setting is used only if login_process_per_use is yes.
#login_max_processes_count = 128

# Maximum number of connections allowed in login state. When this limit is
# reached, the oldest connections are dropped. If login_process_per_user
# is no, this is a per-process value, so the absolute maximum number of users
# logging in actually login_processes_count * max_logging_users.
#login_max_logging_users = 256

##
## POP3 login process
##

# Settings default to same as above, so you don't have to set anything
# unless you want to override them.

login = pop3

# Exception to above rule being the executable location.
#login_executable = /usr/libexec/dovecot/pop3-login

##
## Mail processes
##

# Maximum number of running mail processes. When this limit is reached,
# new users aren't allowed to log in.
#max_mail_processes = 1024

# Show more verbose process titles (in ps). Currently shows user name and
# IP address. Useful for seeing who are actually using the IMAP processes
# (eg. shared mailboxes or if same uid is used for multiple accounts).
#verbose_proctitle = no

# Show protocol level SSL errors.
#verbose_ssl = no

# Valid UID range for users, defaults to 500 and above. This is mostly
# to make sure that users can't log in as daemons or other system users.
# Note that denying root logins is hardcoded to dovecot binary and can't
# be done even if first_valid_uid is set to 0.
#first_valid_uid = 500
#last_valid_uid = 0

# Valid GID range for users, defaults to non-root/wheel. Users having
# non-valid GID as primary group ID aren't allowed to log in. If user
# belongs to supplementary groups with non-valid GIDs, those groups are
# not set.
#first_valid_gid = 1
#last_valid_gid = 0

# Grant access to these extra groups for mail processes. Typical use would be
# to give "mail" group write access to /var/mail to be able to create dotlocks.
#mail_extra_groups =

# ':' separated list of directories under which chrooting is allowed for mail
# processes (ie. /var/mail will allow chrooting to /var/mail/foo/bar too).
# This setting doesn't affect login_chroot or auth_chroot variables.
# WARNING: Never add directories here which local users can modify, that
# may lead to root exploit. Usually this should be done only if you don't
# allow shell access for users. See doc/configuration.txt for more information.
#valid_chroot_dirs =

# Default chroot directory for mail processes. This can be overridden by
# giving /./ in user's home directory (eg. /home/./user chroots into /home).
#mail_chroot =

# Default MAIL environment to use when it's not set. By leaving this empty
# dovecot tries to do some automatic detection as described in
# doc/mail-storages.txt. There's a few special variables you can use:
#
# %u - username
# %n - user part in user@domain, same as %u if there's no domain
# %d - domain part in user@domain, empty if user there's no domain
# %h - home directory
#
# You can also limit a width of string by giving the number of max. characters
# after the '%' character. For example %1u gives the first character of
# username. Some examples:
#
# default_mail_env = maildir:/var/mail/%1u/%u/Maildir
# default_mail_env = mbox:~/mail/:INBOX=/var/mail/%u
# default_mail_env = mbox:/var/mail/%d/%n/:INDEX=/var/indexes/%d/%n
#
#default_mail_env =

# Space-separated list of fields to cache for all mails. Currently these
# fields are allowed followed by a list of commands they speed up:
#
# Envelope - FETCH ENVELOPE and SEARCH FROM, TO, CC, BCC, SUBJECT,
# SENTBEFORE, SENTON, SENTSINCE, HEADER MESSAGE-ID,
# HEADER IN-REPLY-TO
# Body - FETCH BODY
# Bodystructure - FETCH BODY, BODYSTRUCTURE
# MessagePart - FETCH BODY[1.2.3] (ie. body parts), RFC822.SIZE,
# SEARCH SMALLER, LARGER, also speeds up BODY/BODYSTRUCTURE
# generation. This is always set with mbox mailboxes, and
# also default with Maildir.
#
# Different IMAP clients work in different ways, that's why Dovecot by default
# only caches MessagePart which speeds up most operations. Whenever client
# does something where caching could be used, the field is automatically marked
# to be cached later. For example after FETCH BODY the BODY will be cached
# for all new messages. Normally you should leave this alone, unless you know
# what most of your IMAP clients are. Caching more fields than needed makes
# the index files larger and generate useless I/O.
#
# With maildir there's one extra optimization - if nothing is cached, indexing
# the maildir becomes much faster since it's not opening any of the mail files.
# This could be useful if your IMAP clients access only new mails.

#mail_cache_fields = MessagePart

# Space-separated list of fields that Dovecot should never set to be cached.
# Useful if you want to save disk space at the cost of more I/O when the fields
# needed.
#mail_never_cache_fields =

# Workarounds for various client bugs:
# oe6-fetch-no-newmail:
# Never send EXISTS/RECENT when replying to FETCH command. Outlook Express
# seems to think they are FETCH replies and gives user "Message no longer
# in server" error. Note that OE6 still breaks even with this workaround
# if synchronization is set to "Headers Only".
# outlook-idle:
# Outlook and Outlook Express never abort IDLE command, so if no mail
# arrives in half a hour, Dovecot closes the connection. This is still
# fine, except Outlook doesn't connect back so you don't see if new mail
# arrives.
# outlook-pop3-no-nuls:
# Outlook and Outlook Express hang if mails contain NUL characters.
# This setting replaces them with 0x80 character.
#client_workarounds =

# Dovecot can notify client of new mail in selected mailbox soon after it's
# received. This setting specifies the minimum interval in seconds between
# new mail notifications to client - internally they may be checked more or
# less often. Setting this to 0 disables the checking.
# NOTE: Evolution client breaks with this option when it's trying to APPEND.
#mailbox_check_interval = 0

# Like mailbox_check_interval, but used for IDLE command.
#mailbox_idle_check_interval = 30

# Allow full filesystem access to clients. There's no access checks other than
# what the operating system does for the active UID/GID. It works with both
# maildir and mboxes, allowing you to prefix mailboxes names with eg. /path/
# or ~user/.
#mail_full_filesystem_access = no

# Maximum allowed length for custom flag name. It's only forced when trying
# to create new flags.
#mail_max_flag_length = 50

# Save mails with CR+LF instead of plain LF. This makes sending those mails
# take less CPU, especially with sendfile() syscall with Linux and FreeBSD.
# But it also creates a bit more disk I/O which may just make it slower.
#mail_save_crlf = no

# Use mmap() instead of read() to read mail files. read() seems to be a bit
# faster with my Linux/x86 and it's better with NFS, so that's the default.
#mail_read_mmaped = no

# By default LIST command returns all entries in maildir beginning with dot.
# Enabling this option makes Dovecot return only entries which are directories.
# This is done by stat()ing each entry, so it causes more disk I/O.
# (For systems setting struct dirent->d_type, this check is free and it's
# done always regardless of this setting)
#maildir_stat_dirs = no

# Copy mail to another folders using hard links. This is much faster than
# actually copying the file. This is problematic only if something modifies
# the mail in one folder but doesn't want it modified in the others. I don't
# know any MUA which would modify mail files directly. IMAP protocol also
# requires that the mails don't change, so it would be problematic in any case.
# If you care about performance, enable it.
#maildir_copy_with_hardlinks = no

# Check if mails' content has been changed by external programs. This slows
# down things as extra stat() needs to be called for each file. If changes are
# noticed, the message is treated as a new message, since IMAP protocol
# specifies that existing messages are immutable.
#maildir_check_content_changes = no

# Which locking methods to use for locking mbox. There's three available:
# dotlock: Create <mailbox>.lock file. This is the oldest and most NFS-safe
# solution. If you want to use /var/mail/ like directory, the users
# will need write access to that directory.
# fcntl : Use this if possible. Works with NFS too if lockd is used.
# flock : May not exist in all systems. Doesn't work with NFS.
#
# You can use both fcntl and flock too; if you do the order they're declared
# with is important to avoid deadlocks if other MTAs/MUAs are using both fcntl
# and flock. Some operating systems don't allow using both of them
# simultaneously, eg. BSDs. If dotlock is used, it's always created first.
mbox_locks = fcntl

# Should we create dotlock file even when we want only a read-lock? Setting
# this to yes hurts the performance when the mailbox is accessed simultaneously
# by multiple processes, but it's needed for reliable reading if no other
# locking methods are available.
#mbox_read_dotlock = no

# Maximum time in seconds to wait for lock (all of them) before aborting.
#mbox_lock_timeout = 300

# If dotlock exists but the mailbox isn't modified in any way, override the
# lock file after this many seconds.
#mbox_dotlock_change_timeout = 30

# umask to use for mail files and directories
#umask = 0077

# Drop all privileges before exec()ing the mail process. This is mostly
# meant for debugging, otherwise you don't get core dumps. Note that setting
# this to yes means that log file is opened as the logged in user, which
# might not work. It could also be a small security risk if you use single UID
# for multiple users, as the users could ptrace() each others processes then.
#mail_drop_priv_before_exec = no

##
## IMAP process
##

# Executable location
#imap_executable = /usr/libexec/dovecot/imap

# Set max. process size in megabytes. Most of the memory goes to mmap()ing
# files, so it shouldn't harm much even if this limit is set pretty high.
#imap_process_size = 256

# Support for dynamically loadable modules.
#imap_use_modules = no
#imap_modules = /usr/lib/dovecot/imap

##
## POP3 process
##

# Executable location
#pop3_executable = /usr/libexec/dovecot/pop3

# Set max. process size in megabytes. Most of the memory goes to mmap()ing
# files, so it shouldn't harm much even if this limit is set pretty high.
#pop3_process_size = 256

# Support for dynamically loadable modules.
#pop3_use_modules = no
#pop3_modules = /usr/lib/dovecot/pop3

##
## Authentication processes
##

# An Authentication process is a child process used by Dovecot that
# handles the authentication steps. The steps cover an authentication
# mechanism (auth_mechanisms, how the client authenticates in the IMAP or
# POP3 protocol), which password database should be queried (auth_passdb),
# and which user database should be queried (auth_userdb, to obtain
# UID, GID, and location of the user's mailbox/home directory).
#
# You can have multiple processes, though a typical configuration will
# have only one. Each time "auth = xx" is seen, a new process
# definition is started. The point of multiple processes is to be able
# to set stricter permissions. (See auth_user below.)
#
# Just remember that only one Authentication process is asked for the
# password, so you can't have different passwords accessible through
# different process definitions (unless they have different
# auth_mechanisms, and you're ok with having different password for
# each mechanisms).

# Authentication process name.
auth = default

# Specifies how the client authenticates in the IMAP protocol.
# Space separated list of permitted authentication mechanisms:
# anonymous plain digest-md5 cram-md5
#
# anonymous - No authentication required.
# plain - The password is sent as plain text. All IMAP/POP3 clients
# support this, and the password can be encrypted by Dovecot to match
# any of the encryption schemes used in password databases.
# digest-md5 and cram-md5 - both encrypt the password so it is more
# secure in transit, but are not well supported by clients, and
# require that the password database use a matching encryption
# scheme (or be in plaintext).
#
# See auth.txt for more details.
#
# If you are using SSL there is less benefit to digest-md5 and
# cram-md5 as the communication is already encrypted.
auth_mechanisms = plain

# Space separated list of realms for SASL authentication mechanisms that need
# them. You can leave it empty if you don't want to support multiple realms.
# Many clients simply use the first one listed here, so keep the default realm
# first.
#auth_realms =

# Default realm/domain to use if none was specified. This is used for both
# SASL realms and appending @domain to username in plaintext logins.
#auth_default_realm =

# Where user database is kept:
# passwd: /etc/passwd or similiar, using getpwnam()
# passwd-file <path>: passwd-like file with specified location
# static uid=<uid> gid=<gid> home=<dir template>: static settings
# vpopmail: vpopmail library
# ldap <config path>: LDAP, see doc/dovecot-ldap.conf
# pgsql <config path>: a PostgreSQL database, see doc/dovecot-pgsql.conf
auth_userdb = passwd

# Where password database is kept:
# passwd: /etc/passwd or similiar, using getpwnam()
# shadow: /etc/shadow or similiar, using getspnam()
# pam [<service> | *]: PAM authentication
# passwd-file <path>: passwd-like file with specified location
# vpopmail: vpopmail authentication
# ldap <config path>: LDAP, see doc/dovecot-ldap.conf
# pgsql <config path>: a PostgreSQL database, see doc/dovecot-pgsql.conf
#auth_passdb = pgsql /usr/local/etc/dovecot-pgsql.conf
auth_passdb = pam

#auth_executable = /usr/libexec/dovecot/dovecot-auth

# Set max. process size in megabytes.
#auth_process_size = 256

# User to use for the process. This user needs access to only user and
# password databases, nothing else. Only shadow and pam authentication
# requires roots, so use something else if possible. Note that passwd
# authentication with BSDs internally accesses shadow files, which also
# requires roots.
auth_user = root

# Directory where to chroot the process. Most authentication backends don't
# work if this is set, and there's no point chrooting if auth_user is root.
#auth_chroot =

# Number of authentication processes to create
#auth_count = 1

# List of allowed characters in username. If the user-given username contains
# a character not listed in here, the login automatically fails. This is just
# an extra check to make sure user can't exploit any potential quote escaping
# vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
# set this value to empty.
#auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@

# Username to use for users logging in with ANONYMOUS SASL mechanism
#auth_anonymous_username = anonymous

# More verbose logging. Useful for figuring out why authentication isn't
# working.
#auth_verbose = no

# Even more verbose logging for debugging purposes. Shows for example SQL
# queries.
#auth_debug = no

# digest-md5 authentication process. It requires special MD5 passwords which
# /etc/shadow and PAM doesn't support, so we never need roots to handle it.
# Note that the passwd-file is opened before chrooting and dropping root
# privileges, so it may be 0600-root owned file.

#auth = digest_md5
#auth_mechanisms = digest-md5
#auth_realms =
#auth_userdb = passwd-file /etc/passwd.imap
#auth_passdb = passwd-file /etc/passwd.imap
#auth_user = imapauth
#auth_chroot =

# if you plan to use only passwd-file, you don't need the two auth processes,
# simply set "auth_methods = plain digest-md5"

alguna otra sugerencia?

Jefferycoicy
Forista Nuevo
Forista Nuevo
Mensajes: 1
Registrado: Mar Mar 10, 2020 2:07 am

Лучшие Российские и международные онлайн казино 2020

Mensaje por Jefferycoicy »

Если вы любитель онлайн казино 2020 года то, одежда казино официальный сайт, вероятно, заметили, что онлайн-казино приобрели популярность в последние годы. Онлайн-казино дает игроку возможность играть во все свои любимые игры дома и вдали от своего компьютера или даже смартфона. На этой странице вы найдете плюсы и минусы онлайн-казино, а также казино в России, которые лицензированы и позволяют вам наслаждаться магией и бонусами казино, не предлагаемыми реальными казино.

Responder
  • Temas similares
    Respuestas
    Vistas
    Último mensaje